File _patchinfo of Package patchinfo.31172
<patchinfo incident="31172">
<issue tracker="bnc" id="1205726">VUL-0: CVE-2021-33621: ruby: HTTP response splitting in CGI</issue>
<issue tracker="bnc" id="1209891">VUL-0: CVE-2023-28755: ruby2.5,ruby3.1,ruby3.2,rubygem-uri: ReDoS vulnerability in URI</issue>
<issue tracker="bnc" id="1193035">VUL-0: CVE-2021-41817: ruby2.1, ruby2.5, ruby2.7, ruby3.0: Regular Expression Denial of Service Vulnerability of Date Parsing Methods</issue>
<issue tracker="bnc" id="1209967">VUL-0: CVE-2023-28756: ruby: ReDoS vulnerability in Time</issue>
<issue tracker="cve" id="2021-33621"/>
<issue tracker="cve" id="2021-41817"/>
<issue tracker="cve" id="2023-28756"/>
<issue tracker="cve" id="2023-28755"/>
<packager>darix</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for ruby2.5</summary>
<description>This update for ruby2.5 fixes the following issues:
- CVE-2023-28755: Fixed a ReDoS vulnerability in URI. (bsc#1209891)
- CVE-2023-28756: Fixed an expensive regexp in the RFC2822 time parser. (bsc#1209967)
- CVE-2021-41817: Fixed a Regular Expression Denial of Service Vulnerability of Date Parsing Methods. (bsc#1193035)
- CVE-2021-33621: Fixed a HTTP response splitting vulnerability in CGI gem. (bsc#1205726)
</description>
</patchinfo>